other Flashcards

(22 cards)

1
Q

what is forensic art?

A

Art used in conjunction with legal procedures -
used for:
- the identification, apprehension or conviction of offenders
- the location of victims
- identification of unknown deceased persons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

4 guidlines of facial identification compositions (as stated in ACPO guidlines section 4.1.1)

A
  • any notes and sketches produced during the production of an image are subject to disclosure.
  • final composite must be signed and dates by both the witness and practitioner.
  • declaration must be attached tot the composite image to warn handlers that any editing or altering of the composite is tampering with evidence.
  • signed and dated sompositions become exhibits.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are the main forensic art techniques used in the UK?

A
  1. composite facial sketching
  2. facial reconstruction
  3. age progression
  4. crime scene illustration
  5. injury depiction
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

brief description of the forensic art technique: composite facial sketching

A

This involves interviewing witnesses to gather information about a suspect’s appearance and then creating a composite drawing that incorporates those features.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

brief description of the forensic art technique: facial reconstruction

A

This technique is used to recreate the facial features of a deceased person, often from skeletal remains or 3D scans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

brief description of the forensic art technique: age progression

A

This technique helps visualize how an individual’s appearance may change over time, aiding in the location of missing persons or the identification of potential suspects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

brief description of the forensic art technique: crime scene illustration

A

detailed sketches and illustrations of crime scenes, helping investigators understand the layout and identify evidence relationships.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

brief description of the forensic art technique: injury depiction

A

artistic documentation of injuries, helping to compare medical reports with witness descriptions and provide a visual record of trauma.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

how to calculate corresponding compression ratio of an image

A

divide the original file size (uncompressed) by the compressed file size (then put answer in front of :1 ).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

how many bits in a byte

A

8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

convert byte to kbyte

A

divide by 1000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is a JPEG ghost?

A

a visual artifact that can appear in JPEG images, especially when an image has been manipulated or spliced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

how are JPEG ghosts detected?

A

By analysing the DCT (Discrete Cosine Transform) coefficients of a JPEG image, the presence of different compression qualities can be identified and the manipulated region can be localized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the transformation method used in JPEG image
compression?

A

DCT - Discrete cosine transformation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does discrete cosine transformation work?

A

This method converts the image from its spatial representation (pixel values) to a frequency domain representation. This allows for the identification and discarding of less important high-frequency components, reducing file size without significantly impacting perceived image quality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is the difference between pure steganography and secret key steganography?

A

Explain the difference between pure steganography and secret key
steganography

17
Q

what is cryptanalysis?

A

cryptanalysis is the process of deciphering a code without being given a key.

18
Q

what is a common hashing algorithm/function? and what are three key properties for the output?

A

SHA-1
three key properties:
- fixed length
- digest unique to data message
- impossible to recover original message from message digest alone.

19
Q

what is a symmetric key?

A

the same key is used for both encryption and decryption

20
Q

what is an asymmetric key?

A

the key for encryption is different to the one used for encryption.

21
Q

how do vigenere cyphers work?

A

encryption:
1. line up the key under the message so the letters line up (if message is longer than key repeat the key until the end of the message).
2. change the letters for the numbers, numbering them using the placement of the numbers in the alphabet (A = 0).
3. add numbers together. if number above 25, minus 25.
decryption:
do the same but minus the numbers of the keyword from the numbers in the encrypted text.

22
Q

how does the transposition method work for encrypting and decrypting a message?

A

Encryption:
1. assign the keyword numbers according to the order they appear in the alphabet.
2. write the message beneath he keyword, lining up the letters and ignoring spaces.
3. write the letters out in the order of the numbers in the keyword.
decryption:
do this backwards.